mirror of
https://github.com/codex-storage/nim-libp2p.git
synced 2025-01-11 03:26:11 +00:00
c02fca25f8
* Start ChaCha20Poly1305 integration (BearSSL) * Add Curve25519 (BearSSL) required operations for noise * Fix curve mulgen iterate/derive * Fix misleading header * Add chachapoly proper test * Curve25519 integration tests (failing, something is wrong) * Add few converters, finish c25519 integration tests * Remove implicit converters * removed internal globals * Start noise implementation * Fix public() using proper bear mulgen * Noise protocol WIP * Noise progress * Add a quick nim version of HKDF * Converted hkdf to iterator, useful for noise * Noise protocol implementation progress * Noise progress * XX handshake almost there * noise progress * Noise, testing handshake with test vectors * Noise handshake progress, still wrong somewhere! * Noise handshake success! * Full verified noise XX handshake completed * Fix and rewrite test to be similar to switch one * Start with connection upgrade * Switch chachapoly to CT implementations * Improve HKDF implementation * Use a type insted of tuple for HandshakeResult * Remove unnecessary Let * More cosmetic fixes * Properly check randomBytes result * Fix chachapoly signature * Noise full circle (altho dispatcher is nil cursed) * Allow nil aads in chachapoly routines * Noise implementation up to running full test * Use bearssl HKDF as well * Directly use bearssl rng for curve25519 keys * Add a (disabled/no CI) noise interop test server * WIP on fixing interop issues * More fixes in noise implementation for interop * bump chronos requirement (nimble) * Add a chachapoly test for very small size payloads * Noise, more tracing * Add 2 properly working noise tests * Fix payload packing, following the spec properly (and not go version but rather rust) * Sanity, replace discard with asyncCheck * Small fixes and optimization * Use stew endian2 rather then system endian module * Update nimble deps (chronos) * Minor cosmetic/code sanity fixes * Noise, handle Nonce max * Noise tests, make sure to close secured conns * More polish, improve code readability too * More polish and testing again which test fails * Further polishing * Restore noise tests * Remove useless Future[void] * Remove useless CipherState initializer * add a proper read wait future in second noise test * Remove noise generic secure implementation for now * Few fixes to run eth2 sim * Add more debug info in noise traces * Merge size + payload write in sendEncryptedMessage * Revert secure interface, add outgoing property directly in newNoise * remove sendEncrypted and receiveEncrypted * Use openarray in chachapoly and curve25519 helpers
83 lines
2.8 KiB
Nim
83 lines
2.8 KiB
Nim
## Nim-LibP2P
|
|
## Copyright (c) 2019 Status Research & Development GmbH
|
|
## Licensed under either of
|
|
## * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
|
|
## * MIT license ([LICENSE-MIT](LICENSE-MIT))
|
|
## at your option.
|
|
## This file may not be copied, modified, or distributed except according to
|
|
## those terms.
|
|
|
|
import chronos, chronicles, sequtils
|
|
import transport,
|
|
../wire,
|
|
../connection,
|
|
../multiaddress,
|
|
../multicodec,
|
|
../stream/chronosstream
|
|
|
|
logScope:
|
|
topic = "TcpTransport"
|
|
|
|
type TcpTransport* = ref object of Transport
|
|
server*: StreamServer
|
|
|
|
proc connHandler*(t: Transport,
|
|
server: StreamServer,
|
|
client: StreamTransport,
|
|
initiator: bool = false):
|
|
Future[Connection] {.async, gcsafe.} =
|
|
trace "handling connection for", address = $client.remoteAddress
|
|
let conn: Connection = newConnection(newChronosStream(server, client))
|
|
conn.observedAddrs = MultiAddress.init(client.remoteAddress)
|
|
if not initiator:
|
|
let handlerFut = if isNil(t.handler): nil else: t.handler(conn)
|
|
let connHolder: ConnHolder = ConnHolder(connection: conn,
|
|
connFuture: handlerFut)
|
|
t.connections.add(connHolder)
|
|
result = conn
|
|
|
|
proc connCb(server: StreamServer,
|
|
client: StreamTransport) {.async, gcsafe.} =
|
|
trace "incomming connection for", address = $client.remoteAddress
|
|
let t: Transport = cast[Transport](server.udata)
|
|
asyncCheck t.connHandler(server, client)
|
|
|
|
method init*(t: TcpTransport) =
|
|
t.multicodec = multiCodec("tcp")
|
|
|
|
method close*(t: TcpTransport): Future[void] {.async, gcsafe.} =
|
|
## start the transport
|
|
trace "stopping transport"
|
|
await procCall Transport(t).close() # call base
|
|
|
|
t.server.stop()
|
|
t.server.close()
|
|
trace "transport stopped"
|
|
|
|
method listen*(t: TcpTransport,
|
|
ma: MultiAddress,
|
|
handler: ConnHandler):
|
|
Future[Future[void]] {.async, gcsafe.} =
|
|
discard await procCall Transport(t).listen(ma, handler) # call base
|
|
|
|
## listen on the transport
|
|
t.server = createStreamServer(t.ma, connCb, {}, t)
|
|
t.server.start()
|
|
|
|
# always get the resolved address in case we're bound to 0.0.0.0:0
|
|
t.ma = MultiAddress.init(t.server.sock.getLocalAddress())
|
|
result = t.server.join()
|
|
trace "started node on", address = t.ma
|
|
|
|
method dial*(t: TcpTransport,
|
|
address: MultiAddress):
|
|
Future[Connection] {.async, gcsafe.} =
|
|
trace "dialing remote peer", address = $address
|
|
## dial a peer
|
|
let client: StreamTransport = await connect(address)
|
|
result = await t.connHandler(t.server, client, true)
|
|
|
|
method handles*(t: TcpTransport, address: MultiAddress): bool {.gcsafe.} =
|
|
if procCall Transport(t).handles(address):
|
|
result = address.protocols.filterIt( it == multiCodec("tcp") ).len > 0
|